Pub Date : 2024-01-12DOI: 10.1109/mce.2024.3353178
Jinghan Sun, Abdulmotaleb El Saddik, Wei Cai
{"title":"Smart Contract as a Service: A Paradigm of Reusing Smart Contract in Web3 Ecosystem","authors":"Jinghan Sun, Abdulmotaleb El Saddik, Wei Cai","doi":"10.1109/mce.2024.3353178","DOIUrl":"https://doi.org/10.1109/mce.2024.3353178","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-12DOI: 10.1109/mce.2024.3353177
Robert Pell, Sotiris Moschoyainnis, Mohammad Shojafar
{"title":"LSTM based Anomaly Detection of PFCP Signaling Attacks in 5G Networks","authors":"Robert Pell, Sotiris Moschoyainnis, Mohammad Shojafar","doi":"10.1109/mce.2024.3353177","DOIUrl":"https://doi.org/10.1109/mce.2024.3353177","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-08DOI: 10.1109/mce.2024.3350875
Jiong Dong, Mianxiong Dong, Kaoru Ota
{"title":"Exploring Avatar Experiences in Social VR: A Comprehensive Analysis of User Reviews","authors":"Jiong Dong, Mianxiong Dong, Kaoru Ota","doi":"10.1109/mce.2024.3350875","DOIUrl":"https://doi.org/10.1109/mce.2024.3350875","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-03DOI: 10.1109/mce.2024.3349458
Branislav M. Todorović, Nenad M. Stojanović, Gordana S. Velikić
{"title":"Is Direct Sequence Spread Spectrum Modulation Promising for AI-Based Design of 6G Networks?","authors":"Branislav M. Todorović, Nenad M. Stojanović, Gordana S. Velikić","doi":"10.1109/mce.2024.3349458","DOIUrl":"https://doi.org/10.1109/mce.2024.3349458","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-03DOI: 10.1109/mce.2024.3349461
Curtis L. Gittens
{"title":"Dyadic-XV: A Taxonomy of Digital Beings","authors":"Curtis L. Gittens","doi":"10.1109/mce.2024.3349461","DOIUrl":"https://doi.org/10.1109/mce.2024.3349461","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-01DOI: 10.1109/mce.2022.3154357
E. Macedo, Flávia Coimbra Delicato, L. Moraes, G. Fortino
With the outstanding growth in the number of consumer Internet of Things (IoT) connected devices, especially boosted by smart home applications and wearables, there is a need to provide such devices with security. If any device in such consumer IoT systems gets compromised, a data leak may cause serious threats to privacy, material losses, and even put people's lives at risk. Therefore, in this article, we focus on challenges associated with the trust involving communication between IoT devices, which is a key security-related characteristic in consumer IoT applications. A mathematical trust metric, based on a two-level approach, is used to illustrate how the presented proposal can be useful in the objective assessment of confidence and, consequently, provide better security among IoT devices.
{"title":"Assigning Trust to Devices in the Context of Consumer IoT Applications","authors":"E. Macedo, Flávia Coimbra Delicato, L. Moraes, G. Fortino","doi":"10.1109/mce.2022.3154357","DOIUrl":"https://doi.org/10.1109/mce.2022.3154357","url":null,"abstract":"With the outstanding growth in the number of consumer Internet of Things (IoT) connected devices, especially boosted by smart home applications and wearables, there is a need to provide such devices with security. If any device in such consumer IoT systems gets compromised, a data leak may cause serious threats to privacy, material losses, and even put people's lives at risk. Therefore, in this article, we focus on challenges associated with the trust involving communication between IoT devices, which is a key security-related characteristic in consumer IoT applications. A mathematical trust metric, based on a two-level approach, is used to illustrate how the presented proposal can be useful in the objective assessment of confidence and, consequently, provide better security among IoT devices.","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62339596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}